CVE-2022-49963
BaseFortify
Publication date: 2025-06-18
Last updated on: 2025-11-14
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.0 |
| linux | linux_kernel | 6.0 |
| linux | linux_kernel | 6.0 |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is in the Linux kernel's drm/i915/ttm component related to CCS (Color Control Surface) handling. It involves improper handling of large objects during memory copying operations in migrate_copy(). Specifically, integer overflows can occur with large objects, and the copying mechanism fails for objects larger than 8MB due to fixed-size windows used for mapping pages. For objects larger than 64MB, a bug is triggered (GEM_BUG_ON) because the number of CCS blocks exceeds the allowed transfer limit. This results in broken copy handling on DG2 hardware.
How can this vulnerability impact me? :
The vulnerability can cause failures or crashes in the graphics memory management on affected systems, particularly when handling large memory objects (>8MB) on DG2 hardware. This may lead to instability or unexpected behavior in graphics operations, potentially affecting system reliability or performance.